ALT-PU-2022-7493-1
Package firefox updated to version 108.0-alt0.1.rv64 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-00074
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Mozilla Thunderbird, связанная с недостаточной защитой служебных данных, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации
BDU:2023-00384
Уязвимость реализации полноэкранного предупреждающего сообщения браузера Mozilla Firefox, позволяющая нарушителю произвести спуфинговую атаку
BDU:2023-00385
Уязвимость библиотеки libusrsctp браузера Mozilla Firefox, позволяющая нарушителю вызвать использование уязвимой библиотеки и произвести атаку на устройство
Modified: 2024-11-21
CVE-2022-46871
An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. This vulnerability affects Firefox < 108.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1795697
- https://bugzilla.mozilla.org/show_bug.cgi?id=1795697
- [debian-lts-announce] 20230119 [SECURITY] [DLA 3275-1] firefox-esr security update
- [debian-lts-announce] 20230119 [SECURITY] [DLA 3275-1] firefox-esr security update
- [debian-lts-announce] 20230220 [SECURITY] [DLA 3324-1] thunderbird security update
- [debian-lts-announce] 20230220 [SECURITY] [DLA 3324-1] thunderbird security update
- GLSA-202305-06
- GLSA-202305-06
- GLSA-202305-13
- GLSA-202305-13
- DSA-5322
- DSA-5322
- DSA-5355
- DSA-5355
- https://www.mozilla.org/security/advisories/mfsa2022-51/
- https://www.mozilla.org/security/advisories/mfsa2022-51/
Modified: 2024-11-21
CVE-2022-46872
An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.
*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1799156
- https://bugzilla.mozilla.org/show_bug.cgi?id=1799156
- GLSA-202305-06
- GLSA-202305-06
- GLSA-202305-13
- GLSA-202305-13
- https://www.mozilla.org/security/advisories/mfsa2022-51/
- https://www.mozilla.org/security/advisories/mfsa2022-51/
- https://www.mozilla.org/security/advisories/mfsa2022-52/
- https://www.mozilla.org/security/advisories/mfsa2022-52/
- https://www.mozilla.org/security/advisories/mfsa2022-53/
- https://www.mozilla.org/security/advisories/mfsa2022-53/
Modified: 2024-11-21
CVE-2022-46873
Because Firefox did not implement the unsafe-hashes
CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108.
Modified: 2024-11-21
CVE-2022-46874
A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code.
*Note*: This issue was originally included in the advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1. This vulnerability affects Firefox < 108, Thunderbird < 102.6.1, Thunderbird < 102.6, and Firefox ESR < 102.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1746139
- https://bugzilla.mozilla.org/show_bug.cgi?id=1746139
- GLSA-202305-06
- GLSA-202305-06
- GLSA-202305-13
- GLSA-202305-13
- https://www.mozilla.org/security/advisories/mfsa2022-51/
- https://www.mozilla.org/security/advisories/mfsa2022-51/
- https://www.mozilla.org/security/advisories/mfsa2022-52/
- https://www.mozilla.org/security/advisories/mfsa2022-52/
- https://www.mozilla.org/security/advisories/mfsa2022-53/
- https://www.mozilla.org/security/advisories/mfsa2022-53/
- https://www.mozilla.org/security/advisories/mfsa2022-54/
- https://www.mozilla.org/security/advisories/mfsa2022-54/
Modified: 2024-11-21
CVE-2022-46875
The executable file warning was not presented when downloading .atloc and .ftploc files, which can run commands on a user's computer.
*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1786188
- https://bugzilla.mozilla.org/show_bug.cgi?id=1786188
- GLSA-202305-06
- GLSA-202305-06
- GLSA-202305-13
- GLSA-202305-13
- https://www.mozilla.org/security/advisories/mfsa2022-51/
- https://www.mozilla.org/security/advisories/mfsa2022-51/
- https://www.mozilla.org/security/advisories/mfsa2022-52/
- https://www.mozilla.org/security/advisories/mfsa2022-52/
- https://www.mozilla.org/security/advisories/mfsa2022-53/
- https://www.mozilla.org/security/advisories/mfsa2022-53/
Modified: 2024-11-21
CVE-2022-46877
By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 108.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1795139
- https://bugzilla.mozilla.org/show_bug.cgi?id=1795139
- [debian-lts-announce] 20230119 [SECURITY] [DLA 3275-1] firefox-esr security update
- [debian-lts-announce] 20230119 [SECURITY] [DLA 3275-1] firefox-esr security update
- [debian-lts-announce] 20230220 [SECURITY] [DLA 3324-1] thunderbird security update
- [debian-lts-announce] 20230220 [SECURITY] [DLA 3324-1] thunderbird security update
- GLSA-202305-06
- GLSA-202305-06
- GLSA-202305-13
- GLSA-202305-13
- DSA-5322
- DSA-5322
- DSA-5355
- DSA-5355
- https://www.mozilla.org/security/advisories/mfsa2022-51/
- https://www.mozilla.org/security/advisories/mfsa2022-51/
Modified: 2024-11-21
CVE-2022-46878
Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1782219%2C1797370%2C1797685%2C1801102%2C1801315%2C1802395
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1782219%2C1797370%2C1797685%2C1801102%2C1801315%2C1802395
- GLSA-202305-06
- GLSA-202305-06
- GLSA-202305-13
- GLSA-202305-13
- https://www.mozilla.org/security/advisories/mfsa2022-51/
- https://www.mozilla.org/security/advisories/mfsa2022-51/
- https://www.mozilla.org/security/advisories/mfsa2022-52/
- https://www.mozilla.org/security/advisories/mfsa2022-52/
- https://www.mozilla.org/security/advisories/mfsa2022-53/
- https://www.mozilla.org/security/advisories/mfsa2022-53/
Modified: 2024-11-21
CVE-2022-46879
Mozilla developers and community members Lukas Bernhard, Gabriele Svelto, Randell Jesup, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 107. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1736224%2C1793407%2C1794249%2C1795845%2C1797682%2C1797720%2C1798494%2C1799479
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1736224%2C1793407%2C1794249%2C1795845%2C1797682%2C1797720%2C1798494%2C1799479
- GLSA-202305-06
- GLSA-202305-06
- https://www.mozilla.org/security/advisories/mfsa2022-51/
- https://www.mozilla.org/security/advisories/mfsa2022-51/